Skip to Main Content
Security and Privacy in Cyber-Physical Systems
book

Security and Privacy in Cyber-Physical Systems

by Houbing Song, Glenn A. Fink, Sabina Jeschke
November 2017
Intermediate to advanced content levelIntermediate to advanced
472 pages
17h 52m
English
Wiley-IEEE Press
Content preview from Security and Privacy in Cyber-Physical Systems

Chapter 6Key Management in CPSs

Yong Wang and Jason Nikolai

College of Computing, Dakota State University, Madison, SD, 57042, USA

6.1 Introduction

Cyber-physical systems (CPSs) can be found at the core of critical infrastructures and industrial control systems, such as electric power grid, healthcare and medical devices, automotive systems, and manned and unmanned aerial vehicles. A CPS includes both computation and networking components, which are vulnerable to many threats and attacks such as virus and denial-of-service (DoS) attacks. Without security mechanisms, cybercriminals can take over a CPS easily and turn the CPS into a botnet. As wireless technologies are widely adopted and integrated into CPSs, cybercriminals can also leverage wireless network vulnerabilities for eavesdropping and injection attacks. In a demonstration in July 2015, two hackers took control of a car remotely and they were able to command the car to do whatever they asked for (Greenberg, 2015). In another incident reported in 2015, the FBI investigated a case of a passenger tweeting a joke about hacking an airplane's in-flight entertainment system (Zetter, 2015). Many CPSs are life-critical systems. Thus, their security is important. Security services such as confidentiality, integrity, authentication, and nonrepudiation are desired to ensure message security. All these security services require corresponding keys established between the communication entities that must exchange data. Thus, key management ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Internet of Things Security - Second Edition

Practical Internet of Things Security - Second Edition

Brian Russell, Drew Van Duren
Securing Systems

Securing Systems

Brook E. Schoenfield

Publisher Resources

ISBN: 9781119226048Purchase book